[1] SHAMIR A. Identity based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 84 on Advances in Cryptology. Berlin: Springer, 1985: 47-53. [2] 王文强, 陈少真.一种基于身份的高效的环签名方案[J]. 计算机应用, 2009, 29(11): 2990-2997.(WANG W Q, CHEN S Z. Efficient identity-based ring signature scheme[J]. Journal of Computer Applications, 2009, 29(11): 2990-2997.) [3] LIBERT B, QUISQUATER J-J. Identity based undeniable signa-tures[C]//CT-RSA 2004: Proceedings of the 2004 Cryptographers' Track at the RSA Conference. Berlin: Springer, 2004: 112-125. [4] 唐春明, 赵延孟.使用双线性对构造基于身份的不可否认签名[J].深圳大学学报(理工版)2006, 23(1): 85-89.(TANG C M, ZHAO Y M. Identity-based undeniable signatures from bilinear pairings[J]. Journal of Shenzhen University (Science & Engineering), 2006, 23(1): 85-89. [5] KANCHARRLA P K, GUMMADIDALA S, SAXENA A. Identity based strong designated verifier signature scheme[J]. Informatica, 2007, 18(2): 239-252. [6] 褚万霞, 张建中.高效的基于身份的盲签名方案[J]. 计算机工程与应用, 2010, 46(36): 112-113.(CHU W X, ZHANG J Z. Efficient identity-based blind signature scheme[J]. Computer Engineering and Applications, 2010, 46(36): 112-113.) [7] CHAUM D, VAN ANTWERPEN H. Undeniable signatures[C]//Proceedings the CRYPTO 1989 on Advances in Cryptology. Berlin: Springer, 1990: 211-216. [8] CHAUM D. Zero-knowledge undeniable signatures[C]//EUROCRYPT 1990: Proceedings of the 1990 Workshop on the Theory and Application of Cryptographic Techniques Aarhus. Berlin: Springer, 1991: 458-464. [9] 李昕, 刘建辉.基于RSA的XML不可否认签名方法研究[J]. 计算机应用研究, 2009, 26(5): 1900-1907.(LI X, LIU J H. Research of RSA-based XML undeniable signature method[J]. Application Research of Computers, 2009, 26(5): 1900-1907.) [10] LI F, GAO W, WANG Y, et al. Short convertible undeniable signature from pairing[J]. Journal of Software, 2013, 8(12): 2983-2990. [11] 吴晨煌, 黄振杰.代理不可否认签名[J]. 计算机应用, 2006, 26(11): 2592-2595.(WU C H, HUANG Z J. Proxy undeniable signatures[J]. Journal of Computer Applications, 2006, 26(11):2592-2595.) [12] DUAN S. Certificateless undeniable signature schemes[J]. Information Sciences, 2008, 178(3): 742-755. [13] BEHNIA R, HENG S-H, GAN C-S. An efficient certificateless undeniable signature scheme[J]. International Journal of Computer Mathematics, 2015, 92(7): 1313-1328. [14] DENG L, ZENG J, QU Y. Certificateless proxy signature from RSA[J]. Mathematical Problems in Engineering, 2014, 2014: Article ID 373690. |